Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Antonia Nisioti"'
Publikováno v:
Sensors, Vol 21, Iss 16, p 5300 (2021)
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction
Externí odkaz:
https://doaj.org/article/984144dd7cfb45a5b20775416231808d
Publikováno v:
Sensors, Vol 20, Iss 16, p 4540 (2020)
Phishing is one of the most common threats that users face while browsing the web. In the current threat landscape, a targeted phishing attack (i.e., spear phishing) often constitutes the first action of a threat actor during an intrusion campaign. T
Externí odkaz:
https://doaj.org/article/8e3ce0dc80ae471585c0a81f8e09c693
Publikováno v:
Forensic Science International: Digital Investigation. 44:301480
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:2397-2412
Cyber attacks consisting of several attack actions can present considerable challenge to forensic investigations. Consider the case where a cybersecurity breach is suspected following the discovery of one attack action, for example by observing the m
Publikováno v:
Sensors, Vol 21, Iss 5300, p 5300 (2021)
Sensors
Volume 21
Issue 16
Sensors (Basel, Switzerland)
Sensors
Volume 21
Issue 16
Sensors (Basel, Switzerland)
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction
Publikováno v:
IEEE Communications Surveys & Tutorials. 20:3369-3388
Over the last five years there has been an increase in the frequency and diversity of network attacks. This holds true, as more and more organizations admit compromises on a daily basis. Many misuse and anomaly based intrusion detection systems (IDSs
Publikováno v:
IEEE Symposium on Computers and Communications (ISCC)
ISCC
ISCC
Smartphones have become a vital part of our business and everyday life, as they constitute the primary communication vector. Android dominates the smartphone market (86.2%) and has become pervasive, running in ‘smart’ devices such as tablets, TV,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0de03de302aca4e6aa53027886b56da4
https://eprints.bournemouth.ac.uk/30563/1/08024571.pdf
https://eprints.bournemouth.ac.uk/30563/1/08024571.pdf
Desktop browsers have introduced private browsing mode, a security control which aims to protect users’ data that are generated during a private browsing session, by not storing\ud them in the file system. As the Internet becomes ubiquitous, the ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::befed9b13004be592b081c20ca862336
https://eprints.bournemouth.ac.uk/27850/1/2017_Exploring_the_protection_of_private_brow.pdf
https://eprints.bournemouth.ac.uk/27850/1/2017_Exploring_the_protection_of_private_brow.pdf